skip to main content
DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: A physical unclonable neutron sensor for nuclear arms control inspections

Abstract

Abstract Classical sensor security relies on cryptographic algorithms executed on trusted hardware. This approach has significant shortcomings, however. Hardware can be manipulated, including below transistor level, and cryptographic keys are at risk of extraction attacks. A further weakness is that sensor media themselves are assumed to be trusted, and any authentication and encryption is done ex situ and a posteriori. Here we propose and demonstrate a different approach to sensor security that does not rely on classical cryptography and trusted electronics. We designed passive sensor media that inherently produce secure and trustworthy data, and whose honest and non-malicious nature can be easily established. As a proof-of-concept, we manufactured and characterized the properties of non-electronic, physical unclonable, optically complex media sensitive to neutrons for use in a high-security scenario: the inspection of a military facility to confirm the absence or presence of nuclear weapons and fissile materials.

Authors:
ORCiD logo;
Publication Date:
Sponsoring Org.:
USDOE
OSTI Identifier:
1724292
Resource Type:
Published Article
Journal Name:
Scientific Reports
Additional Journal Information:
Journal Name: Scientific Reports Journal Volume: 10 Journal Issue: 1; Journal ID: ISSN 2045-2322
Publisher:
Nature Publishing Group
Country of Publication:
United Kingdom
Language:
English

Citation Formats

Philippe, Sébastien, and d’Errico, Francesco. A physical unclonable neutron sensor for nuclear arms control inspections. United Kingdom: N. p., 2020. Web. https://doi.org/10.1038/s41598-020-77459-3.
Philippe, Sébastien, & d’Errico, Francesco. A physical unclonable neutron sensor for nuclear arms control inspections. United Kingdom. https://doi.org/10.1038/s41598-020-77459-3
Philippe, Sébastien, and d’Errico, Francesco. Thu . "A physical unclonable neutron sensor for nuclear arms control inspections". United Kingdom. https://doi.org/10.1038/s41598-020-77459-3.
@article{osti_1724292,
title = {A physical unclonable neutron sensor for nuclear arms control inspections},
author = {Philippe, Sébastien and d’Errico, Francesco},
abstractNote = {Abstract Classical sensor security relies on cryptographic algorithms executed on trusted hardware. This approach has significant shortcomings, however. Hardware can be manipulated, including below transistor level, and cryptographic keys are at risk of extraction attacks. A further weakness is that sensor media themselves are assumed to be trusted, and any authentication and encryption is done ex situ and a posteriori. Here we propose and demonstrate a different approach to sensor security that does not rely on classical cryptography and trusted electronics. We designed passive sensor media that inherently produce secure and trustworthy data, and whose honest and non-malicious nature can be easily established. As a proof-of-concept, we manufactured and characterized the properties of non-electronic, physical unclonable, optically complex media sensitive to neutrons for use in a high-security scenario: the inspection of a military facility to confirm the absence or presence of nuclear weapons and fissile materials.},
doi = {10.1038/s41598-020-77459-3},
journal = {Scientific Reports},
number = 1,
volume = 10,
place = {United Kingdom},
year = {2020},
month = {11}
}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record
https://doi.org/10.1038/s41598-020-77459-3

Save / Share:

Works referenced in this record:

Rattling nucleons: New developments in active interrogation of special nuclear material
journal, January 2012

  • Runkle, Robert C.; Chichester, David L.; Thompson, Scott J.
  • Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, Vol. 663, Issue 1
  • DOI: 10.1016/j.nima.2011.09.052

Modeling attacks on physical unclonable functions
conference, January 2010

  • Rührmair, Ulrich; Sehnke, Frank; Sölter, Jan
  • CCS '10 Proceedings of the 17th ACM conference on Computer and communications security, p. 237-249
  • DOI: 10.1145/1866307.1866335

Physical unclonable functions
journal, February 2020


scikit-image: image processing in Python
journal, January 2014

  • van der Walt, Stéfan; Schönberger, Johannes L.; Nunez-Iglesias, Juan
  • PeerJ, Vol. 2
  • DOI: 10.7717/peerj.453

Proton range verification with ultrasound imaging using injectable radiation sensitive nanodroplets: a feasibility study
journal, March 2020

  • Carlier, Bram; Heymans, Sophie V.; Nooijens, Sjoerd
  • Physics in Medicine & Biology, Vol. 65, Issue 6
  • DOI: 10.1088/1361-6560/ab7506

Radiation dosimetry and spectrometry with superheated emulsions
journal, September 2001

  • d'Errico, Francesco
  • Nuclear Instruments and Methods in Physics Research Section B: Beam Interactions with Materials and Atoms, Vol. 184, Issue 1-2
  • DOI: 10.1016/S0168-583X(01)00730-3

Light fields in complex media: Mesoscopic scattering meets wave control
journal, March 2017


A physical zero-knowledge object-comparison system for nuclear warhead verification
journal, September 2016

  • Philippe, Sébastien; Goldston, Robert J.; Glaser, Alexander
  • Nature Communications, Vol. 7, Issue 1
  • DOI: 10.1038/ncomms12890

Implementation and security analysis of practical quantum secure direct communication
journal, February 2019


Detection of special nuclear material with a transportable active interrogation system
journal, November 2018

  • d’Errico, Francesco; Felici, Giuseppe; Chierici, Andrea
  • The European Physical Journal Plus, Vol. 133, Issue 11
  • DOI: 10.1140/epjp/i2018-12292-6

Generalized optical memory effect
journal, January 2017

  • Osnabrugge, Gerwin; Horstmeyer, Roarke; Papadopoulos, Ioannis N.
  • Optica, Vol. 4, Issue 8
  • DOI: 10.1364/OPTICA.4.000886

"How do I fool you?": Manipulating User Trust via Misleading Black Box Explanations
conference, February 2020

  • Lakkaraju, Himabindu; Bastani, Osbert
  • AIES '20: AAAI/ACM Conference on AI, Ethics, and Society, Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society
  • DOI: 10.1145/3375627.3375833

Recent trends in high-resolution hard x-ray tomography
conference, October 2019


Sensor physical unclonable functions
conference, June 2010

  • Rosenfeld, Kurt; Gavas, Efstratios; Karri, Ramesh
  • 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
  • DOI: 10.1109/HST.2010.5513103

Magnetic resonance imaging of single atoms on a surface
journal, July 2019


Sensitivity of the multiple-scattering speckle pattern to the motion of a single scatterer
journal, April 1991


Measuring the Transmission Matrix in Optics: An Approach to the Study and Control of Light Propagation in Disordered Media
journal, March 2010


A proposed approach for monitoring nuclear warhead dismantlement
journal, January 2001

  • Gerdes, Eric R.; Johnston, Roger G.; Doyle, James E.
  • Science & Global Security, Vol. 9, Issue 2
  • DOI: 10.1080/08929880108426491

Physical One-Way Functions
journal, September 2002


Deferred verification: verifiable declarations of fissile-material stocks for disarmament purposes
journal, May 2019


Spectre Attacks: Exploiting Speculative Execution
conference, May 2019

  • Kocher, Paul; Horn, Jann; Fogh, Anders
  • 2019 IEEE Symposium on Security and Privacy (SP)
  • DOI: 10.1109/SP.2019.00002

New Developments and Applications of Superheated Emulsions: Warhead Verification and Special Nuclear Material Interdiction
journal, April 2018

  • d’Errico, F.; Chierici, A.; Gattas-Sethi, M.
  • Radiation Protection Dosimetry, Vol. 180, Issue 1-4
  • DOI: 10.1093/rpd/ncy037

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
conference, October 2016

  • Genkin, Daniel; Pachmanov, Lev; Pipman, Itamar
  • CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
  • DOI: 10.1145/2976749.2978353

A zero-knowledge protocol for nuclear warhead verification
journal, June 2014

  • Glaser, Alexander; Barak, Boaz; Goldston, Robert J.
  • Nature, Vol. 510, Issue 7506
  • DOI: 10.1038/nature13457

Physical Unclonable Functions for Device Authentication and Secret Key Generation
conference, June 2007


How to insure that data acquired to verify treaty compliance are trustworthy
journal, May 1988

  • Simmons, G. J.
  • Proceedings of the IEEE, Vol. 76, Issue 5
  • DOI: 10.1109/5.4446

The Landscape of Exascale Research: A Data-Driven Literature Analysis
journal, July 2020

  • Heldens, Stijn; Hijma, Pieter; Werkhoven, Ben Van
  • ACM Computing Surveys, Vol. 53, Issue 2
  • DOI: 10.1145/3372390

Theoretically efficient high-capacity quantum-key-distribution scheme
journal, February 2002


A Survey of Hardware Trojan Taxonomy and Detection
journal, January 2010

  • Tehranipoor, Mohammad; Koushanfar, Farinaz
  • IEEE Design & Test of Computers, Vol. 27, Issue 1
  • DOI: 10.1109/MDT.2010.7

Virtual Proofs of Reality and their Physical Implementation
conference, May 2015

  • Ruhrmair, Ulrich; Martinez-Hurtado, J. L.; Xu, Xiaolin
  • 2015 IEEE Symposium on Security and Privacy (SP)
  • DOI: 10.1109/SP.2015.12

Learning-based imaging through scattering media
journal, January 2016

  • Horisaki, Ryoichi; Takagi, Ryosuke; Tanida, Jun
  • Optics Express, Vol. 24, Issue 13
  • DOI: 10.1364/OE.24.013738

Quantum cryptography: Public key distribution and coin tossing
journal, December 2014


A bubble-damage polymer detector for neutrons
journal, January 1984